INSPYR Solutions
Technology Product Analyst
Location: Vienna, Virginia
Duration: Initial 6 months contract with extensions
Compensation: $55-$65/hr
Work Requirements: US Citizen, GC Holders or Authorized to work in US
Responsibilities
Requirements gathering and documentation. Ability to analyze and manage business requirements through discussions, use cases and tools like ADO
Risk Reduction: capture business requirements working with end users/customers, maintain exceptions/issues, submit Risk Assessments and work with Engineers to implement solutions
Enhanced Security: collaborate with stakeholders to develop and implement efficient IAM solutions, streamline access management processes and reduce administrative overhead
Planning and Reporting: assist with Agile/SAFe processes, ensure quarterly IAM objectives are met as part of the overall Mission Padlock program, generate weekly/monthly/quarterly metrics across the IAM program
Understanding identity and access management principles such as Modern Authentication Methods, Least Privilege, and Privileged Access Management
Elicit, research, analyze, and document functional, non-functional, and data requirements utilizing stakeholder interviews, workshops, business process modeling, diagramming, use case analysis, data analysis, journey mapping, and prototyping
Facilitate requirements discussions, present requirements and supporting material through alternative views, and continuously incorporate feedback into the product backlog
Collaborate with vendors on the design, development, and delivery of new products and platforms
Evaluate alternative solutions and processes as necessary
Identify risks/issues and collaborate with the project/product team to mitigate
Provide timely and concise communication of information to all appropriate internal and external stakeholders through a variety of communication channels
Manage multiple priorities independently and/or in a team environment
Qualifications
Bachelor’s degree in Management Information Systems, Computer Science, Software Engineering, or related field, or equivalent combination of training, education, and experience
8+ years experience as an IAM Systems Analyst, Business Systems Analyst, Product Development Analyst, Business Technology Analyst, or other related role
Knowledge and experience applying agile delivery methodologies and frameworks (e.g., SAFe, Scrum, Kanban) to deliver new products and capabilities
Knowledge of software/system engineering best practices
Effective planning, research, analytical, and problem‑solving skills
Ability to effectively plan, organize, and prioritize multiple large, complex efforts
Ability to communicate technical concepts to both technical and non‑technical stakeholders
Ability to resolve problems and identify root cause
Effective interpersonal, verbal, and written communication skills
Advanced skill in Microsoft Office application suite including Excel, PowerPoint, and Visio
Experience with Financial Services industry applications, systems, standards, practices, and trends
SAFe Agilist, Product Owner / Product Manager, Scrum Master, Lean Portfolio Management certification or other related SAFe certifications
Certified Scrum Master (CSM), DevOps, Microsoft Azure, or other IT industry certifications
Experience with Microsoft Azure DevOps
Proposed Deliverables Requirements Delivery
Capture detailed stakeholder use cases, system requirements, and process flows specific to IAM components. Focus on identity lifecycle events like provisioning, authentication, password resets, and self‑service workflows
Systems Documentation: Mapping, Reporting, Diagramming
Draft and assist architect and Engineer to create visual process models illustrating key workflows: provisioning, authentication (including SAML, OAuth2/OIDC), self‑service, and integrations with internal and external systems
Diagrams should delineate decision points, exception pathways, and error handling routines
Technical Design Specifications
Blueprint the consolidated architecture overview, data flows, attribute mappings, authentication protocols, and system interfaces
Runbooks and Deployment Guides
Write step‑by‑step operational instructions for setting up and maintaining the IAM environment: installing components, configuring directories, setting policy agents, managing certificates, rolling back changes, and executing daily maintenance routines
#J-18808-Ljbffr
Responsibilities
Requirements gathering and documentation. Ability to analyze and manage business requirements through discussions, use cases and tools like ADO
Risk Reduction: capture business requirements working with end users/customers, maintain exceptions/issues, submit Risk Assessments and work with Engineers to implement solutions
Enhanced Security: collaborate with stakeholders to develop and implement efficient IAM solutions, streamline access management processes and reduce administrative overhead
Planning and Reporting: assist with Agile/SAFe processes, ensure quarterly IAM objectives are met as part of the overall Mission Padlock program, generate weekly/monthly/quarterly metrics across the IAM program
Understanding identity and access management principles such as Modern Authentication Methods, Least Privilege, and Privileged Access Management
Elicit, research, analyze, and document functional, non-functional, and data requirements utilizing stakeholder interviews, workshops, business process modeling, diagramming, use case analysis, data analysis, journey mapping, and prototyping
Facilitate requirements discussions, present requirements and supporting material through alternative views, and continuously incorporate feedback into the product backlog
Collaborate with vendors on the design, development, and delivery of new products and platforms
Evaluate alternative solutions and processes as necessary
Identify risks/issues and collaborate with the project/product team to mitigate
Provide timely and concise communication of information to all appropriate internal and external stakeholders through a variety of communication channels
Manage multiple priorities independently and/or in a team environment
Qualifications
Bachelor’s degree in Management Information Systems, Computer Science, Software Engineering, or related field, or equivalent combination of training, education, and experience
8+ years experience as an IAM Systems Analyst, Business Systems Analyst, Product Development Analyst, Business Technology Analyst, or other related role
Knowledge and experience applying agile delivery methodologies and frameworks (e.g., SAFe, Scrum, Kanban) to deliver new products and capabilities
Knowledge of software/system engineering best practices
Effective planning, research, analytical, and problem‑solving skills
Ability to effectively plan, organize, and prioritize multiple large, complex efforts
Ability to communicate technical concepts to both technical and non‑technical stakeholders
Ability to resolve problems and identify root cause
Effective interpersonal, verbal, and written communication skills
Advanced skill in Microsoft Office application suite including Excel, PowerPoint, and Visio
Experience with Financial Services industry applications, systems, standards, practices, and trends
SAFe Agilist, Product Owner / Product Manager, Scrum Master, Lean Portfolio Management certification or other related SAFe certifications
Certified Scrum Master (CSM), DevOps, Microsoft Azure, or other IT industry certifications
Experience with Microsoft Azure DevOps
Proposed Deliverables Requirements Delivery
Capture detailed stakeholder use cases, system requirements, and process flows specific to IAM components. Focus on identity lifecycle events like provisioning, authentication, password resets, and self‑service workflows
Systems Documentation: Mapping, Reporting, Diagramming
Draft and assist architect and Engineer to create visual process models illustrating key workflows: provisioning, authentication (including SAML, OAuth2/OIDC), self‑service, and integrations with internal and external systems
Diagrams should delineate decision points, exception pathways, and error handling routines
Technical Design Specifications
Blueprint the consolidated architecture overview, data flows, attribute mappings, authentication protocols, and system interfaces
Runbooks and Deployment Guides
Write step‑by‑step operational instructions for setting up and maintaining the IAM environment: installing components, configuring directories, setting policy agents, managing certificates, rolling back changes, and executing daily maintenance routines
#J-18808-Ljbffr